This website is a repository for my cybersecurity projects and a place to share ideas on InfoSec, technology and cloud computing.

I have a background in digital design and 3D visualisation. I have also run my own business for a few years. I love working with businesses and contribute to their success. With cloud computing and data privacy being paramount to business and everyday life, I want to help companies and people keep their data safe and their systems resilient to threats.

I’m a certified Azure Security Engineer and keep learning about information security, governance, risk and compliance. Below, a growing list of knowledge and experience accrued.

I also have a mentor in cyber governance which is helping me solidify and develop in this area: so grateful for it!


CERTS: 

  • Microsoft Cybersecurity Analyst Professional
  • MS AZ-500: Microsoft Azure Security Engineer Associate
  • The GRC approach to managing cybersecurity – Kennesaw state uni

PERSONAL PROJECTS AND LABS

  • Try Hack Me labs, Advent of Cyber 2025
  • Setup and configured Pfsense firewall
  • Network segmentation on Unifi router and access point
  • Built and configured Network Attached Storage (TrueNAS)
  • Reviewing cybersecurity news daily/weekly and analysing threat actor’s tactics and techniques used, as well as best controls for each vulnerability. Sources include: Simply Cyber Daily threat brief, CISO series, Click Here podcast, Darknet Diaries)
  • Microsoft Cybersecurity Analyst Professional: Network segmentation project + Capstone project

COURSES

  • Comptia A+
  • DR. CHUCK, Python for everyone
  • Hands-on Python for networking professionals, ITPro.TV
  • Reading: “Mastering Information Security Compliance Management” – ISO 2001:2022
  • The Definitive GRC Analyst Master Class – Simply Cyber
    •  Prepared, executed, and reported on audit of subset of NIST SP 800-53 cybersecurity controls
      to include interview, document review, and testing of systems to support compliance audit
      activities.
    • Knowledgeable on NIST Cybersecurity Framework and how the Identify, Protect, Detect,
      Respond, and Recover categories comprise and facilitate an information security program
    • Semi-quantitatively analysed cybersecurity risk using NIST SP 800-30 methodology to identify
      highest risk weaknesses for a system
    • Executed threat modeling exercise to determine higher likelihood threat events to inform
      cybersecurity risk modeling